Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-22403 |
CWE-ID | CWE-614 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
IBM Aspera Faspex for Linux Web applications / Other software IBM Aspera Faspex for Windows Web applications / Other software |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU106236
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-22403
CWE-ID:
CWE-614 - Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to IBM Aspera Faspex does not set the secure attribute on authorization tokens or session cookies. A remote attacker can get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Aspera Faspex for Linux: 5.0.0 - 5.0.1
IBM Aspera Faspex for Windows: 5.0.0 - 5.0.1
CPE2.3https://www.ibm.com/support/pages/node/6618965
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.